Can only stick together for warmth
Chapter 288:Can only stick together for warmth
Before the Dragon scale security software went online, there was already a lot of news about this software on the network.
After all, the day before the magic fairy technology to do a world-shattering event, gorgeous hit the face of hackers around the world, it is said that the props used are this dragon scale security software.
Especially in various forums about cybersecurity, security software has been the hottest topic.
Most people are so excited about the software that it will be a turning point in the information networking era.After this, hackers will become history, and viruses and whatever will become spicy chickens.
These are all good sounds.
However, there are also singing on the Internet, that the magic technology said that relying on the dragon scale security software to resist the world's hacker attacks is a completely grandstanding word, a software can not achieve such an effect.
The reason why such an outcome may be that the illusion of technology has adopted some unknown means.
However, now this software, the sound of singing and dying instantly disappear clean.
The first thing countless professionals do when they download software is to test whether it is as powerful as it is.As for whether the image of this software is very vivid, it is not within the scope of attention of these programs apes.
In their view, what is no longer budding can be compared to that line of perfect code.
The results of the experiment made them very excited and embarrassed!
The computer installed the Longsheng security software is in front of the computer, the above vulnerabilities are still those loopholes, the virus that was sent in the past is also those viruses, but it can't attack, which can't be done.
So far, no one in these forums has dared to say that he has broken the defense of the software.
It is in the top hackers in the hands of Satan, the most concentrated website forum, all the people who think they are masters are also collectively silent.
Many of them have also participated in the previous action against the magic fairy technology, and many people are very reluctant to their own failure, that fantasy technology has made a ghost.
Now the magic technology will put the software out, and it is open to download, how can they not act in the first time to break through the software in the face of the magic fairy technology?
However, there was no sound for a few hours, which is very telling.
This is definitely the most powerful security software in the world today, if not its relatively single function in security protection, I am afraid it can completely replace a series of network security devices such as hardware firewalls and intrusion gateways.
However, although the current Longxing security software does not have this function, but who dares to say that Magician Technology will not add these functions next?
At that time, there will be a large number of network security service providers crying in the toilet.
If the safety software of the dragon scale is to most people's expectations, then the outstanding performance of this software in terms of intelligence makes everyone's heart tight.
When people are exposed to this software, the first thing they understand is not its security, but its intelligence.
There is no real indicator to measure the intelligence of a software, but people have given the dragon scale security software a different evaluation: not to lose people at all.
Whether it is the logic of “he” in the dialogue, or the ability to respond to problems, is amazing.
An hour after the launch of the Longxian security software, the major online media took the lead, and a piece of news was quickly put on the portal.
“Pandora’s box is opened!”Artificial intelligence is amazing to the world.”Newly news.
"Strong artificial intelligence appears, where is the way out of the human race."The rapid news.
"Fantasy technology is once again stirring up the field, and the biggest black horse in the field of artificial intelligence!"The Phoenix News Network.
At this moment, few people pay attention to the functions of Longxian software in network security, and more focus on the intelligence that this software has.
The mainstream media is still very strong in the guidance of public opinion, and the hot spots of people's discussion are almost transferred to the artificial intelligence in the first time.
Anyone with a scale in their heart, no matter how powerful the network attack and defense means, is not more important than the real artificial intelligence.
At the same time, many people are also spitting in their hearts, since Magic Fairy Technology can make such a powerful artificial intelligence, then how can you only get a network security software?What do you make a robot and how tall you look?
Even if the robot you make can't even go, just have to have this super smart, which can also sell a sky-high price.
How much can you sell this security software now?Even if it costs later, how much is appropriate?
However, this time the people are much less than before, and everyone is used to it.
These violent things, before the magic fairy technology has done a lot, not bad this one.
...
Huaxia Kyoto, Qi fox company headquarters, a group of people sitting around the conference table, one by one sad face.
Sitting in the most central position is Zhou Hong, chairman of Qi Fox Company.
Since the 1990s, Huaxia has been born a large number of magical Internet companies, especially the three most typical, become the business card of domestic Internet companies, and now even become a well-deserved international Internet giant.
And Qi fox company, although a short distance from these three companies, but also the leader of the second echelon.
Its chairman Zhou Hong, the age is only more than 40, can be described as Fenghua Zhengmao.In general, there are few things that make him so distressed, including the famous 3Q war, Zhou Hong also showed half a weakness.
But now, Zhou Hong really feels helpless.
“Can’t really crack it?”Zhou Hong suddenly raised his head and once again turned to Wang Tao, the technical director of the company sitting in his starting position.
Wang Tao laughed bitterly: “President Zhou, we have done our best.”In the past, no matter how complex the software, we may take a lot of time to crack it, but we can at least find the direction of our efforts.But for the magic technology of the dragon scale security software, we studied for most of the day, in addition to the outer code to figure out, the core code file inside is like a stinky and hard stone, there is no way to start.
There was a bit of bitterness in Zhou Hong’s mouth, and Wang Tao had already said these words to him.
But what is the use of the outer code?They are only responsible for receiving instructions, and then launching service requests to the core code through a specific interface, which is equivalent to a second hand, which has no meaning at all.
“Why is it so hard on this bone?”Self-deprecating is good Zhou Hong can't help but explode the sentence**.
I don’t blame him, who is making this time too fucked up?Recently, Qi Fox is preparing to take stock listing, as a shareholder of the company, which one does not want the stock price of the company to rise sharply after listing?
Now this incident is definitely a huge blow for the company.
“What about the Silver Mountain Company?”Have they done the software cracking?"Zhou Hong asked.
Wang Tao said: "Yinshan company those people's ability is clear, the level is similar to ours, want to crack this software, almost impossible."
Zhou Hongli took a look at the office and said, "Gentlemen, the reason why our company has become a first-class Internet company in China is because we have advantages that other companies cannot match in the field of network security."Whether it is the number of users or the word of mouth of users, it has exploded with other companies.At present, we also have in-depth cooperation with major government and enterprise institutions in this field, and even foreign businesses have carried out a lot.Originally, according to our advantages, the stock price will inevitably skyrocket after the listing.But now because of the black horse of fantasy technology, it may make our listing plan sink sand.Do you have any good opinions about this?”
“Soon to find a way to get each other’s source code?”A middle-of-the-art man with a cold face said.
Almost everyone looked at him with contempt, and everyone knew what he meant by the idea of what he called it.However, what they despise is not that the other way is fading, but that way is very **.
The source code of a software is undoubtedly a trade secret, and if it can be so easily obtained from the source code of Magic Technology, it is estimated that the company will not develop on the scale of the present.
The confidentiality of phantom technology in technology is definitely in the forefront of the major companies in the world today.
Among the current rumors about the technology of illusion, the most convincing thing is that all the core technologies of phantom technology are only in the hands of Shen Bing.If you want to get these technologies, you can only get them from the ice.
But is the ice so moving?
Zhou Hong is not an ordinary person, and naturally knows that some things that ordinary people do not know, whether it is magic fairy technology or Shen ice, it is impossible to move.
A competent woman sitting next to Zhou Hong said, "We don't need to be opposed to fantasy technology, cooperation is also a good choice."
“How can we cooperate?Security software is not more than the other, it is extremely exclusive, and their market share is high, and we will naturally decrease.”Zhou Hong said.
It’s a fact that you can’t always install two antivirus software on one device, right?
“The winter in the field of cyber security is coming!”He sighed, “I can only hold the group warm.”
Zhou Hong saw not far enough, this is not only the network security field of the company's winter, countless information technology companies in the world are trembling, the wisdom of the safety software, represents its endless potential, no matter which area the illusion of science and technology will put it into, will start the stormy waves.
Even Apple, the world’s most valuable company in the world, is currently holding a special meeting to study and discuss the launch of this software.
But the atmosphere of their discussion is different from that of Qi Fox, and Apple's meeting is generally more pleasant.
Their two issues are the number of users of this long scale security software after the market, and the second is how to cooperate with Magician Technology.
Apple has its own pride because they have the most complete software ecosystem.
Comments
No comments yet. Be the first to comment on this chapter!